MS-102 Study Guide: Mastering Microsoft Entra ID Identity Protection (2026)

Introduction

The MS-102 exam doesn’t just test if you know where the buttons are; it tests if you can defend an enterprise identity in real-time. Static security policies aren’t enough anymore. Hackers are using sophisticated password sprays and token replays that bypass basic MFA. As an MS-102 administrator, your job is to move beyond “check-the-box” security and implement an intelligent, risk-based defense.

In this guide, we’re breaking down Microsoft Entra ID Identity Protection—the “brain” of Microsoft 365 security. We will cover the critical differences between User Risk and Sign-in Risk, the exact licensing you need to know for the exam, and how to automate remediation so you can stop attacks before they start.


What Is Microsoft Entra ID Identity Protection?

Microsoft Entra ID Identity Protection is a risk-based security feature that:

  • Detects suspicious sign-ins
  • Identifies compromised accounts
  • Assigns risk levels
  • Enables automated remediation

It uses Microsoft’s global threat intelligence and behavioral analytics to evaluate authentication activity across tenants worldwide.

Microsoft Entra ID Identity Protection

Why Identity Protection Matters in Microsoft 365

Most attacks today target identities.

Common attack patterns include:

  • Phishing-based credential theft
  • Token replay attacks
  • Password spray attacks
  • Sign-ins from malicious IP addresses

Identity Protection helps detect these risks early and respond automatically.

For MS-102, you must understand how identity risk is detected and mitigated.


Understanding Risk Types

Microsoft Entra ID Identity Protection evaluates two primary risk categories:

1️⃣ Sign-In Risk

Sign-in risk measures the likelihood that a specific authentication attempt is suspicious.

Examples:

  • Impossible travel (logins from two distant countries within minutes)
  • Anonymous IP address usage
  • Sign in from known malicious infrastructure
  • Unusual sign-in behavior

Risk levels:

  • Low
  • Medium
  • High

Sign-in risk applies only to that authentication event.


2️⃣ User Risk

User risk reflects the probability that an account has been compromised.

Examples:

  • Leaked credentials discovered on the dark web
  • Repeated suspicious activity
  • Confirmed compromised account

User risk persists until remediated.

This distinction is important for MS-102 exam scenarios.

FeatureSign-In RiskUser Risk
FocusThe specific authentication attemptThe overall account integrity
TriggersImpossible travel, Anonymous IPLeaked credentials, Dark web
Typical PolicyRequire MFARequire Password Change
PersistencePer-sessionUntil remediated

Where to Access Identity Protection

Navigate to the Microsoft Entra Admin Center
→ ID Protection

Microsoft Entra Hybrid Identity Models Explained showing PHS, PTA and Federation authentication methods
Master Microsoft Entra Hybrid Identity Models (PHS vs PTA vs Federation) – Complete MS-102 Guide
Microsoft Entra ID Identity Protection Dashboard

From here, you can view:

  • Risky users
  • Risky sign-ins
  • Risk detections
  • User risk policies
  • Sign-in risk policies

This dashboard provides real-time visibility into identity threats across your tenant.


Risk-Based Policies

Identity Protection allows you to automate responses through policies.

User Risk Policy

Used when a user account is likely compromised.

Common configuration:

If user risk = High
Then, require a password reset

This forces secure recovery before access is restored.

Sign-In Risk Policy

Used during suspicious authentication attempts.

Example:

If sign-in risk = Medium or High
Then require MFA

This adds a verification layer before access is granted.


Lab 1: Create a Sign-In Risk Policy

  • Go to Microsoft Entra Admin Center
  • Navigate to Identity Protection → Dashboard → Protect → Conditional Access
  • Select Conditional Access
  • Assign users or groups
  • Select resources to all resources (formerly ‘All cloud apps’)
  • Select Conditions
  • Set the sign-in risk level to Medium and High
  • Under Access controls, select Require MFA
  • It’s recommended to enable Policy with Report-Only before actually enforcing it.

Lab 2:Configure a User Risk Policy

  • Navigate to Identity Protection
  • Select the Conditional Access
  • Assign users or groups
  • Select resources to all resources (formerly ‘All cloud apps’)
  • Select Conditions
  • Set User risk level to High
  • In Controls: Choose Require password change
  • It’s recommended to enable Policy with Report-Only before actually enforcing it.

Risk Remediation

Administrators can respond by:

  • Forcing a password reset
  • Blocking sign-in
  • Requiring MFA
  • Investigating logs
  • Confirming compromise status

Once remediation occurs, risk levels are cleared.


Password Writeback (Hybrid Scenario)

In hybrid environments:

  • Password resets are performed in the cloud
  • Are written back to on-prem Active Directory

This ensures consistent identity protection across environments.

Password writeback requires a proper hybrid configuration.


Licensing Requirements

Microsoft Entra ID Identity Protection requires:

  • Microsoft Entra ID P2
    or
  • Microsoft 365 E5

This is commonly tested in MS-102.

3D infographic of Microsoft 365 Organizational Settings menu showing Services, Security & Privacy, and Org Profile sections for MS-102 exam preparation
The Ultimate Guide to 60 Microsoft 365 Organizational Settings (MS-102)

MS-102 Exam Alert: Microsoft loves to ask about Entra ID P1. Remember: P1 gives you security reports, but it does not allow you to automate the “Require Password Reset” or “Require MFA” policies. You must have P2 for automation.


Identity Protection vs Conditional Access

Conditional Access:

  • Enforces policy rules

Identity Protection:

  • Detects risk
  • Feeds risk signals into Conditional Access

Together, they create adaptive access control.

This integration is a key exam concept.


MS-102 Exam Alignment

Focus on:

  • Difference between sign-in risk and user risk
  • Risk-based Conditional Access integration
  • Automated remediation workflows
  • Licensing requirements
  • Dashboard navigation

Expect scenario-based questions.


MS-102 Key Exam Takeaways: Identity Protection

What is the difference between User Risk and Sign-in Risk?

  • Sign-in Risk: High probability that the current authentication request is unauthorized (e.g., login from an anonymous IP or “impossible travel”).
  • User Risk: High probability that the entire account is compromised (e.g., leaked credentials found on the dark web).

Which license is required for Microsoft Entra ID Identity Protection?

For the MS-102 exam, remember that full automated risk-based policies require Microsoft Entra ID P2 or Microsoft 365 E5. While P1 includes some security features, it does not support the automated risk remediation policies discussed in this guide.

How do you remediate a “High” User Risk?

The standard remediation for a high-risk user is a forced password reset. This must be done through a User Risk Policy. For hybrid users, Password Writeback must be enabled for the cloud reset to update the on-premises Active Directory.

What is the best way to test Identity Protection policies?

Microsoft recommends using “Report-only” mode in Conditional Access before enforcing policies. To simulate a risk event for testing, you can use the Tor Browser to sign in (triggers Anonymous IP risk) or use a VPN to simulate Impossible Travel.

Can I use Identity Protection with Conditional Access?

Yes. In fact, Microsoft is migrating legacy ID Protection policies into Conditional Access. In the MS-102 exam, look for scenarios where “Sign-in Risk” or “User Risk” are used as Conditions within a Conditional Access policy to trigger MFA or Block access.


Final Insights

Microsoft Entra ID Identity Protection transforms identity security from static enforcement to intelligent risk-based defense.

MFA verifies identity.
Conditional Access enforces policy.
Identity Protection decides when stronger controls are needed.

As an MS-102 administrator, understanding how identity risk flows through your tenant is critical.

If you’re new to this learning series, start with the main MS-102 Microsoft 365 Administrator overview, where we explain how all chapters connect and what skills you’ll build across the journey.

For the most accurate and up-to-date exam objectives and reference material, Microsoft maintains the official MS-102 documentation on Microsoft Learn. This series complements those resources by focusing on real-world administrative understanding.

In the next post, we will explore Self-Service Password Reset (SSPR) and how it integrates with identity protection and user lifecycle management.

Leave a Comment